Mort Zuckerman
2009-12-18 02:54:48 UTC
To: ***@naiad.nih.gov, ***@yale.edu,
***@columbia.edu, ***@nymc.edu,
***@ostp.gov, ***@princeton.edu,
***@fiu.edu, ***@niaid.nih.gov, ***@niaid.nih.gov,
***@yahoogroups.com, ***@calea.org, ***@gmail.com,
***@usdoj.gov, ***@sbcglobal.net,
***@nejm.org, ***@courant.com, ***@cdc.gov,
***@po.state.ct.us, ***@po.state.ct.us, executive-
***@nytimes.com, managing-***@nytimes.com, news-
***@nytimes.com, ***@nytimes.com, ***@nytimes.com,
***@nytimes.com, ***@cdc.gov, ***@optonline.net,
***@hotmail.com, ***@aol.com, ***@courant.com,
***@yahoo.com, ***@fff.org, ***@usdoj.gov,
***@po.state.ct.us, ***@washpost.com,
***@washpost.com, ***@allegorypress.com,
***@po.state.ct.us, ***@comcast.net,
***@comcast.net, ***@po.state.ct.us, ***@charter.net,
***@po.state.ct.us, ***@po.state.ct.us,
***@po.state.ct.us, ***@usdoj.gov,
***@yale.edu, ***@greenwich-post.com,
***@yale.edu, ***@nswbc.org, ***@aol.com,
***@nytimes.com, ***@stmartin.edu
Cc: ***@ucia.gov, dr-***@president.ir,
***@washpost.com, ***@niaid.nih.gov,
***@newstimes.com, ***@hotmail.com, ***@aol.com,
***@gmail.com, ***@rms-law.com, ***@aol.com,
***@yahoo.com, ***@yahoo.com,
***@usdoj.gov, ***@usdoj.gov,
***@usdoj.gov, ***@yale.edu,
***@yale.edu, ***@yale.edu, ***@aldf.com,
***@idsociety.org, ***@theatlantic.com
Subject: Funniest News Story of the Decade: "Insurgents Hack Drones"
Date: Dec 17, 2009 9:52 PM
Well, well, well. This sure blows
a big hole in Kissinger's Khaos Theory:
http://rawstory.com/2009/12/insurgents-hacked-drones/
http://www.carlisle.army.mil/USAWC/parameters/97summer/peters.htm
"For the world masses, devastated by information they cannot manage or
effectively interpret, life is "nasty, brutish . . . and short-
circuited." The general pace of change is overwhelming, and
information is both the motor and signifier of change. Those humans,
in every country and region, who cannot understand the new world, or
who cannot profit from its uncertainties, or who cannot reconcile
themselves to its dynamics, will become the violent enemies of their
inadequate governments, of their more fortunate neighbors, and
ultimately of the United States. We are entering a new American
century, in which we will become still wealthier, culturally more
lethal, and increasingly powerful. We will excite hatreds without
precedent."
ROTFL
http://www.actionlyme.org/KISSINGER_TERROR.htm
"He also mentions that something might happen at the end of the Bush
administration that will convince everyone to, basically, accept one
world government."
(Like the collapse of the Petrodollar)
--------------------
Insurgents in Iraq and Afghanistan have intercepted live video feeds
from Predator drones, a key weapon in a Pentagon spy system that
serves as the military's eyes in the sky for surveillance and
intelligence collection.
Though militants could see the video, there is no evidence they were
able to jam the electronic signals from the unmanned aerial craft or
take control of the vehicles, a senior defense official said Thursday,
speaking on condition of anonymity to discuss sensitive intelligence
issues.
Obtaining the video feeds can provide insurgents with critical
information about what the military may be targeting, including
buildings, roads and other facilities.
Shiite fighters in Iraq used off-the-shelf software programs such as
SkyGrabber — available for as little as $25.95 on the Internet — to
regularly capture drone video feeds, the Wall Street Journal reported
Thursday. The interception, first done there at least a year ago, was
possible because the remotely flown planes had unprotected
communications links.
FULL STORY FOLLOWS BELOW
Story continues below...
Pentagon: Insurgents intercepted drone spy videos
Pentagon: Iraqi, Afghan insurgents intercepted US spy videos from
Predator drones
PAULINE JELINEK
AP News
Dec 17, 2009 20:06 EST
Insurgents in Iraq and Afghanistan have intercepted live video feeds
from Predator drones, a key weapon in a Pentagon spy system that
serves as the military's eyes in the sky for surveillance and
intelligence collection.
Though militants could see the video, there is no evidence they were
able to jam the electronic signals from the unmanned aerial craft or
take control of the vehicles, a senior defense official said Thursday,
speaking on condition of anonymity to discuss sensitive intelligence
issues.
Obtaining the video feeds can provide insurgents with critical
information about what the military may be targeting, including
buildings, roads and other facilities.
Shiite fighters in Iraq used off-the-shelf software programs such as
SkyGrabber — available for as little as $25.95 on the Internet — to
regularly capture drone video feeds, the Wall Street Journal reported
Thursday. The interception, first done there at least a year ago, was
possible because the remotely flown planes had unprotected
communications links.
Within the last several months, the military has found evidence of at
least one instance where insurgents in Afghanistan also monitored U.S.
drone video, a second defense official said. He had no details on how
many times it was done in Afghanistan or by which group.
The Defense Department has addressed the issue, and is working to
encrypt all of its drone video feeds from Iraq, Afghanistan and
Pakistan, defense officials said. One defense official noted that
upgrading the encryption in the drones is a lengthy process because
there are at least 600 unmanned vehicles along with thousands of
ground stations to address.
Officials said that systems in key threat areas were upgraded first.
Dale Meyerrose, former chief information officer for the U.S.
intelligence community, compared the problem to street criminals
listening to police scanners.
"This was just one of the signals, a broadcast signal, and there was
no hacking. It is the interception of a broadcast signal," said
Meyerrose, who worked to field the unmanned systems in the 1990s, when
he was a senior Air Force officer.
The problem, he said, is that when the drones were first being
developed they were using commercial equipment, which as time goes on
could become vulnerable to intercepts.
The Predator, also currently used in the hunt for al-Qaida and other
militants in Pakistan, Somalia and elsewhere, can fly for hours
remotely controlled by pilots thousands of miles away. It can fly
armed or unarmed, and is part of a growing arsenal of such craft that
includes the Reaper and Raven as well as a new, high-tech video sensor
system called the Gorgon Stare, being installed on Reapers.
The military has known about the vulnerability for more than a decade,
but assumed adversaries would not be able to exploit it.
Then in December 2008, the military apprehended a Shiite militant in
Iraq whose laptop contained files of intercepted drone video feeds,
the Journal reported. In July 2009, they found pirated feeds on other
militant laptops, leading some officials to conclude that groups
trained and funded by Iran were regularly intercepting feeds and
sharing them with multiple extremist groups.
Defense Secretary Robert Gates asked the Pentagon's intelligence
chief, James R. Clapper, Jr., to look into the problem and coordinate
the work to address it. Officials said that when the intercepts were
discovered, it raised concerns, but technical adjustments were not
difficult and were put in motion quickly.
The hacking is just another example of how formidable and inventive
the extremists can be. The U.S. has spent billions of dollars, for
instance, fighting homemade bombs in Iraq and Afghanistan, the No. 1
killer of troops and the weapon of choice by militants who have easy
access to the materials needed to make them and use modern
telecommunications networks to exchange information about how to
improve them.
Pentagon spokesman Bryan Whitman said the military continually
evaluates the technologies it uses and quickly corrects any
vulnerabilities found.
___
Associated Press writers Anne Flaherty and Lolita C. Baldor
contributed to this report.
"[Real] scientists are *fiercely* independent. That's the good
news."-- NIH's Top Fool, Anthony Fauci
***@columbia.edu, ***@nymc.edu,
***@ostp.gov, ***@princeton.edu,
***@fiu.edu, ***@niaid.nih.gov, ***@niaid.nih.gov,
***@yahoogroups.com, ***@calea.org, ***@gmail.com,
***@usdoj.gov, ***@sbcglobal.net,
***@nejm.org, ***@courant.com, ***@cdc.gov,
***@po.state.ct.us, ***@po.state.ct.us, executive-
***@nytimes.com, managing-***@nytimes.com, news-
***@nytimes.com, ***@nytimes.com, ***@nytimes.com,
***@nytimes.com, ***@cdc.gov, ***@optonline.net,
***@hotmail.com, ***@aol.com, ***@courant.com,
***@yahoo.com, ***@fff.org, ***@usdoj.gov,
***@po.state.ct.us, ***@washpost.com,
***@washpost.com, ***@allegorypress.com,
***@po.state.ct.us, ***@comcast.net,
***@comcast.net, ***@po.state.ct.us, ***@charter.net,
***@po.state.ct.us, ***@po.state.ct.us,
***@po.state.ct.us, ***@usdoj.gov,
***@yale.edu, ***@greenwich-post.com,
***@yale.edu, ***@nswbc.org, ***@aol.com,
***@nytimes.com, ***@stmartin.edu
Cc: ***@ucia.gov, dr-***@president.ir,
***@washpost.com, ***@niaid.nih.gov,
***@newstimes.com, ***@hotmail.com, ***@aol.com,
***@gmail.com, ***@rms-law.com, ***@aol.com,
***@yahoo.com, ***@yahoo.com,
***@usdoj.gov, ***@usdoj.gov,
***@usdoj.gov, ***@yale.edu,
***@yale.edu, ***@yale.edu, ***@aldf.com,
***@idsociety.org, ***@theatlantic.com
Subject: Funniest News Story of the Decade: "Insurgents Hack Drones"
Date: Dec 17, 2009 9:52 PM
Well, well, well. This sure blows
a big hole in Kissinger's Khaos Theory:
http://rawstory.com/2009/12/insurgents-hacked-drones/
http://www.carlisle.army.mil/USAWC/parameters/97summer/peters.htm
"For the world masses, devastated by information they cannot manage or
effectively interpret, life is "nasty, brutish . . . and short-
circuited." The general pace of change is overwhelming, and
information is both the motor and signifier of change. Those humans,
in every country and region, who cannot understand the new world, or
who cannot profit from its uncertainties, or who cannot reconcile
themselves to its dynamics, will become the violent enemies of their
inadequate governments, of their more fortunate neighbors, and
ultimately of the United States. We are entering a new American
century, in which we will become still wealthier, culturally more
lethal, and increasingly powerful. We will excite hatreds without
precedent."
ROTFL
http://www.actionlyme.org/KISSINGER_TERROR.htm
"He also mentions that something might happen at the end of the Bush
administration that will convince everyone to, basically, accept one
world government."
(Like the collapse of the Petrodollar)
--------------------
Insurgents in Iraq and Afghanistan have intercepted live video feeds
from Predator drones, a key weapon in a Pentagon spy system that
serves as the military's eyes in the sky for surveillance and
intelligence collection.
Though militants could see the video, there is no evidence they were
able to jam the electronic signals from the unmanned aerial craft or
take control of the vehicles, a senior defense official said Thursday,
speaking on condition of anonymity to discuss sensitive intelligence
issues.
Obtaining the video feeds can provide insurgents with critical
information about what the military may be targeting, including
buildings, roads and other facilities.
Shiite fighters in Iraq used off-the-shelf software programs such as
SkyGrabber — available for as little as $25.95 on the Internet — to
regularly capture drone video feeds, the Wall Street Journal reported
Thursday. The interception, first done there at least a year ago, was
possible because the remotely flown planes had unprotected
communications links.
FULL STORY FOLLOWS BELOW
Story continues below...
Pentagon: Insurgents intercepted drone spy videos
Pentagon: Iraqi, Afghan insurgents intercepted US spy videos from
Predator drones
PAULINE JELINEK
AP News
Dec 17, 2009 20:06 EST
Insurgents in Iraq and Afghanistan have intercepted live video feeds
from Predator drones, a key weapon in a Pentagon spy system that
serves as the military's eyes in the sky for surveillance and
intelligence collection.
Though militants could see the video, there is no evidence they were
able to jam the electronic signals from the unmanned aerial craft or
take control of the vehicles, a senior defense official said Thursday,
speaking on condition of anonymity to discuss sensitive intelligence
issues.
Obtaining the video feeds can provide insurgents with critical
information about what the military may be targeting, including
buildings, roads and other facilities.
Shiite fighters in Iraq used off-the-shelf software programs such as
SkyGrabber — available for as little as $25.95 on the Internet — to
regularly capture drone video feeds, the Wall Street Journal reported
Thursday. The interception, first done there at least a year ago, was
possible because the remotely flown planes had unprotected
communications links.
Within the last several months, the military has found evidence of at
least one instance where insurgents in Afghanistan also monitored U.S.
drone video, a second defense official said. He had no details on how
many times it was done in Afghanistan or by which group.
The Defense Department has addressed the issue, and is working to
encrypt all of its drone video feeds from Iraq, Afghanistan and
Pakistan, defense officials said. One defense official noted that
upgrading the encryption in the drones is a lengthy process because
there are at least 600 unmanned vehicles along with thousands of
ground stations to address.
Officials said that systems in key threat areas were upgraded first.
Dale Meyerrose, former chief information officer for the U.S.
intelligence community, compared the problem to street criminals
listening to police scanners.
"This was just one of the signals, a broadcast signal, and there was
no hacking. It is the interception of a broadcast signal," said
Meyerrose, who worked to field the unmanned systems in the 1990s, when
he was a senior Air Force officer.
The problem, he said, is that when the drones were first being
developed they were using commercial equipment, which as time goes on
could become vulnerable to intercepts.
The Predator, also currently used in the hunt for al-Qaida and other
militants in Pakistan, Somalia and elsewhere, can fly for hours
remotely controlled by pilots thousands of miles away. It can fly
armed or unarmed, and is part of a growing arsenal of such craft that
includes the Reaper and Raven as well as a new, high-tech video sensor
system called the Gorgon Stare, being installed on Reapers.
The military has known about the vulnerability for more than a decade,
but assumed adversaries would not be able to exploit it.
Then in December 2008, the military apprehended a Shiite militant in
Iraq whose laptop contained files of intercepted drone video feeds,
the Journal reported. In July 2009, they found pirated feeds on other
militant laptops, leading some officials to conclude that groups
trained and funded by Iran were regularly intercepting feeds and
sharing them with multiple extremist groups.
Defense Secretary Robert Gates asked the Pentagon's intelligence
chief, James R. Clapper, Jr., to look into the problem and coordinate
the work to address it. Officials said that when the intercepts were
discovered, it raised concerns, but technical adjustments were not
difficult and were put in motion quickly.
The hacking is just another example of how formidable and inventive
the extremists can be. The U.S. has spent billions of dollars, for
instance, fighting homemade bombs in Iraq and Afghanistan, the No. 1
killer of troops and the weapon of choice by militants who have easy
access to the materials needed to make them and use modern
telecommunications networks to exchange information about how to
improve them.
Pentagon spokesman Bryan Whitman said the military continually
evaluates the technologies it uses and quickly corrects any
vulnerabilities found.
___
Associated Press writers Anne Flaherty and Lolita C. Baldor
contributed to this report.
"[Real] scientists are *fiercely* independent. That's the good
news."-- NIH's Top Fool, Anthony Fauci